Ning Hu

Orcid: 0009-0003-4470-128X

According to our database1, Ning Hu authored at least 132 papers between 1995 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
PHCG: PLC Honeypoint Communication Generator for Industrial IoT.
IEEE Trans. Mob. Comput., January, 2025

2024
Security Assessment of Intelligent Connected Vehicles Based on the Cyber Range.
IEEE Netw., May, 2024

Optimizing Mobility-Aware Task Offloading in Smart Healthcare for Internet of Medical Things Through Multiagent Reinforcement Learning.
IEEE Internet Things J., April, 2024

Surface defect detection method for air rudder based on positive samples.
J. Intell. Manuf., January, 2024

Stability Analysis of Quaternion-Valued Neutral Neural Networks with Generalized Activation Functions.
Cogn. Comput., January, 2024

MKEAH: Multimodal knowledge extraction and accumulation based on hyperplane embedding for knowledge-based visual question answering.
Virtual Real. Intell. Hardw., 2024

An Efficient (t, n) Threshold Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Knowledge Embedding Enabled Cyber Security Defense for Networked System: A Novel Risk Detection Method based on Knowledge Graph.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Extracting Financial Events from Raw Texts via Matrix Chunking.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

ESem: To Harden Process Synchronization for Servers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

TS-AUBD: A Novel Two-Stage Method for Abnormal User Behavior Detection.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Lumbar spine localisation method based on feature fusion.
CAAI Trans. Intell. Technol., September, 2023

A secure and flexible edge computing scheme for AI-driven industrial IoT.
Clust. Comput., February, 2023

Mobile Supply: The Last Piece of Jigsaw of Recommender System.
CoRR, 2023

ESMC: Entire Space Multi-Task Model for Post-Click Conversion Rate via Parameter Constraint.
CoRR, 2023

Exploring the Spatiotemporal Features of Online Food Recommendation Service.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

Reliabilities of Eye Fixations for Assessing Short-term Memory on Forward Span Tasks.
Proceedings of the 7th International Conference on Medical and Health Informatics, 2023

BASM: A Bottom-up Adaptive Spatiotemporal Model for Online Food Ordering Service.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Unsupervised Intra-Domain Adaptation for Recommendation via Uncertainty Minimization.
Proceedings of the 39th IEEE International Conference on Data Engineering, ICDE 2023, 2023

Bi-ETC: A Bidirectional Encrypted Traffic Classification Model Based on BERT and BiLSTM.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Building a High-Performance Data Channel for the Federal Cyber Range.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

A HMM-Based ICS Adaptive Deception Defense Framework.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Intrusion Detection Techniques Analysis in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

Binary Code Similarity Detection: State and Future.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

OPTIMA-DEM: An Optimized Threat Behavior Prediction Method using DEMATEL-ISM.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

CSPM: A Contrastive Spatiotemporal Preference Model for CTR Prediction in On-Demand Food Delivery Services.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Multi-Granularity Attention Model for Group Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

2022
SQRT: A Secure Querying Scheme of Routing Table Based on Oblivious Transfer.
Symmetry, 2022

Digital Twin Application in Ground Simulating Space Debris System With Laser-Driven Flyer Technology.
IEEE Access, 2022

A New Method for Quality Analysis of Multi-Process Manufacture.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Research on the construction and application of knowledge graph for process quality optimization.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

SMRT: An Effective Malicious Node Resistance Design for Mixnets.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A virtualization-based security architecture for industrial control systems.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Data Encoding Method for Multipath Anonymous Transmission.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

TLD-WF: Surfing Freely Under Website Fingerprinting Attacks.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

TFHM: A Traffic Feature Hiding Scheme Based on Generative Adversarial Networks.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Survey of Obfuscation and Deobfuscation Techniques in Android Code Protection.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Stealth: A Heterogeneous Covert Access Channel for Mix-net.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Spatiotemporal-Enhanced Network for Click-Through Rate Prediction in Location-based Services.
Proceedings of the Workshop on Deep Learning for Search and Recommendation (DL4SR 2022) co-located with the 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022

Reliability Simulation Evaluation Technology of Network System with Hardware and Software Combined.
Proceedings of the Asia Conference on Algorithms, Computing and Machine Learning, 2022

2021
Disruption-Free Load Balancing for Aerial Access Network.
Wirel. Commun. Mob. Comput., 2021

Deep-Green: A Dispersed Energy-Efficiency Computing Paradigm for Green Industrial IoT.
IEEE Trans. Green Commun. Netw., 2021

An Energy-Efficient In-Network Computing Paradigm for 6G.
IEEE Trans. Green Commun. Netw., 2021

Experimental and Numerical Investigation of the Micro-Crack Damage in Elastic Solids by Two-Way Collinear Mixing Method.
Sensors, 2021

Building Agile and Resilient UAV Networks Based on SDN and Blockchain.
IEEE Netw., 2021

A multiple-kernel clustering based intrusion detection scheme for 5G and IoT networks.
Int. J. Mach. Learn. Cybern., 2021

OpenKG Chain: A Blockchain Infrastructure for Open Knowledge Graphs.
Data Intell., 2021

Edge Intelligence Based Identification and Classification of Encrypted Traffic of Internet of Things.
IEEE Access, 2021

Multifunctional Cardiomyocyte-Based Biosensor for Electrophysiology-Mechanical Beating-Growth Viability Monitoring.
Proceedings of the 16th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2021

A Secure Dispersed Computing Scheme for Internet of Mobile Things.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

An Anonymous Communication System Based on Software Defined Architecture.
Proceedings of the Mobile Internet Security - 5th International Symposium, 2021

Non-functional Attribute Modeling and Verification Method for Integrated Modular Avionics System.
Proceedings of the 4th International Conference on Complex Systems Design & Management Asia, 2021

2020
A novel cost-aware algorithm for dynamic task placement problem in a heterogeneous Internet-scale data center.
J. Supercomput., 2020

Deterministic Lateral Displacement-Based Separation of Magnetic Beads and Its Applications of Antibody Recognition.
Sensors, 2020

DCG: A Client-side Protection Method for DNS Cache.
J. Internet Serv. Inf. Secur., 2020

The method of Internet of Things access and network communication based on MQTT.
Comput. Commun., 2020

Multi-scale orthogonal basis method for nonlinear fractional equations with fractional integral boundary value conditions.
Appl. Math. Comput., 2020

Wearable-sensors Based Activity Recognition for Smart Human Healthcare Using Internet of Things.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

ADTM: an Anonymous Data Transmission Model based on Multiple Oblivious Internet Channels.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Decentralization of DNS: Old Problems and New Challenges.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Fading with the Time: A Traceless Access Scheme for Anonymous Communication Network.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Bearing Health Assessment Based on Different Types of Masses Voting Match and Mahalanobis Distance under Different Operating Conditions.
Proceedings of the AIAM2020: 2nd International Conference on Artificial Intelligence and Advanced Manufacture, 2020

2019
Effective Cycle Slip Detection and Repair for PPP/INS Integrated Systems.
Sensors, 2019

An Inverse Approach of Damage Identification Using Lamb Wave Tomography.
Sensors, 2019

Efficient Multiple Kernel k-Means Clustering With Late Fusion.
IEEE Access, 2019

K-Means Clustering With Incomplete Data.
IEEE Access, 2019

Research on the Prediction Method of Weighted Regression Based on Sample Size.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

BlockZone: A Blockchain-Based DNS Storage and Retrieval Scheme.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Infrared Laser Pulses Excite Action Potentials in Primary Cortex Neurons In Vitro.
Proceedings of the 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2019

2018
Interaction of Lamb Wave Modes with Weak Material Nonlinearity: Generation of Symmetric Zero-Frequency Mode.
Sensors, 2018

Springbok: An App deployment accelerator for Android smart devices.
Comput. Electr. Eng., 2018

Multiple Kernel Clustering With Global and Local Structure Alignment.
IEEE Access, 2018

Research on Online Reinforcement Learning Method Based on Experience-Replay.
Proceedings of the IEEE International Conference on Information and Automation, 2018

Forearm Muscle Synergy Reducing Dimension of the Feature Matrix in Hand Gesture Recognition.
Proceedings of the 3rd International Conference on Advanced Robotics and Mechatronics, 2018

Neuromuscular Electrical Stimulation with Kilohertz Frequency Alternating Current to Enhance Sensorimotor Cortical Excitability.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

Neural Representation Of Harmonic Single Sideband Encoder In Inferior Colliculus Of Guinea Pigs.
Proceedings of the 40th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2018

BlockCAM: A Blockchain-Based Cross-Domain Authentication Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Feedback control of stable force output with evoked sEMG based on virtual hand prosthesis.
Proceedings of the IEEE International Conference on Cyborg and Bionic Systems, 2018

2017
Design and Performance of a Portable and Multichannel SPR Device.
Sensors, 2017

面向软件安全性需求分析过程的追踪模型 (Traceability Model Oriented to Software Safety Requirement Analysis Process).
计算机科学, 2017

基于规则的用例规约验证方法 (Rule-based Verification of Use Case Specification).
计算机科学, 2017

980nm infrared neural stimulation of sciatic nerve enhanced by carbon nanoparticles.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

Auditory responses to short-wavelength infrared neural stimulation of the rat cochlear nucleus.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

2016
High-Throughput Assessment of Drug Cardiac Safety Using a High-Speed Impedance Detection Technology-Based Heart-on-a-Chip.
Micromachines, 2016

Robo recall.
Proceedings of the SIGGRAPH ASIA 2016, Macao, December 5-8, 2016 - VR Showcase, 2016

2015
Measurement Method of Magnetic Field for the Wire Suspended Micro-Pendulum Accelerometer.
Sensors, 2015

Cooperative monitoring BGP among autonomous systems.
Secur. Commun. Networks, 2015

A novel Love Wave biosensor for rapid and sensitive detection of marine toxins.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

High-sensitive and high-efficient biochemical analysis method using a bionic electronic eye in combination with a smartphone-based colorimetric reader system.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Detection and classification of tastants in vivo using a novel bioelectronic tongue in combination with brain-machine interface.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

2014
Damage Evaluation Based on a Wave Energy Flow Map Using Multiple PZT Sensors.
Sensors, 2014

An Efficient Algorithm Embedded in an Ultrasonic Visualization Technique for Damage Inspection Using the AE Sensor Excitation Method.
Sensors, 2014

Hazard analysis for AADL model.
Proceedings of the 2014 IEEE 20th International Conference on Embedded and Real-Time Computing Systems and Applications, 2014

Formal Specification and Transformation Method of System Requirements from B Method to AADL Model.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Automatic Construction of Synthetic Musical Instruments and Performers.
PhD thesis, 2013

Theoretical Analysis of the Optical Propagation Characteristics in a Fiber-Optic Surface Plasmon Resonance Sensor.
Sensors, 2013

A Simplified Traffic Generating Method for Network Reliability Based on Self-Similar Model.
J. Commun., 2013

On the Anonymity of Identity-Based Encryption.
J. Appl. Math., 2013

Application of freeman decomposition to full polarimetric GPR.
Proceedings of the 2013 IEEE International Geoscience and Remote Sensing Symposium, 2013

CoISM: Improving Security and Accuracy of BGP through Information Sharing.
Proceedings of the Frontiers in Internet Technologies, 2013

2011
Piezoresistive Strain Sensors Made from Carbon Nanotubes Based Polymer Nanocomposites.
Sensors, 2011

2009
Structure optimization of multi-finger power SiGe HBTs for thermal stability improvement.
Microelectron. Reliab., 2009

An Alliance Based Reputation Model for Internet Autonomous System Trust Evaluation.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Routing Policy Conflict Detection without Violating ISP's Privacy.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

On the achievable outage probability of opportunistic relaying with decode-and-forward.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

A computational method for outage probability exploiting spatial diversity without channel state information at transmitter.
Proceedings of the 22nd Canadian Conference on Electrical and Computer Engineering, 2009

Reputation Mechanism for Inter-domain Routing Security Management.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
Regenerative Strategy for Fairness in Bi-directional Three-Node Relaying.
IEICE Trans. Commun., 2008

Cooperative Management Framework for Inter-domain Routing System.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
A comparative evaluation of search techniques for query-by-humming using the MUSART testbed.
J. Assoc. Inf. Sci. Technol., 2007

Connected Dominating Set in 3-dimensional Space for Ad Hoc Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
Bootstrap learning for accurate onset detection.
Mach. Learn., 2006

Applying role based access control and genetic algorithms to insider threat detection.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
A Bootstrap Method for Training an Accurate Audio Segmenter.
Proceedings of the ISMIR 2005, 2005

Dynamic Threshold Scheme Used in Directed Diffusion.
Proceedings of the Embedded Software and Systems, Second International Conference, 2005

2004
The MUSART Testbed for Query-by-Humming Evaluation.
Comput. Music. J., 2004

Evaluation of algorithms for segmentation of the prostate boundary from 3D ultrasound images.
Proceedings of the Medical Imaging 2004: Image Processing, 2004

Understanding Search Performance in Query-by-Humming Systems.
Proceedings of the ISMIR 2004, 2004

Security for fixed sensor networks.
Proceedings of the 42nd Annual Southeast Regional Conference, 2004

2003
Training for Physical Tasks in Virtual Environments: Tai Chi.
Proceedings of the IEEE Virtual Reality Conference 2003 (VR 2003), 2003

Polyphonic Audio Matching for Score Following and Intelligent Audio Editors.
Proceedings of the 2003 International Computer Music Conference, 2003

2002
A humane tool for aiding computer science advisors, computer science students, and parents.
SIGCAS Comput. Soc., 2002

MasterMotion: full body wireless virtual reality for Tai Chi.
Proceedings of the 29th International Conference on Computer Graphics and Interactive Techniques, 2002

A comparison of melodic database retrieval techniques using sung queries.
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries, 2002

Pattern Discovery Techniques for Music Audio.
Proceedings of the ISMIR 2002, 2002

Prostate surface segmentation from 3D ultrasound images.
Proceedings of the 2002 IEEE International Symposium on Biomedical Imaging, 2002

A Probabilistic Model of Melodic Similarity.
Proceedings of the 2002 International Computer Music Conference, 2002

Discovering Musical Structure in Audio Recordings.
Proceedings of the Music and Artificial Intelligence, Second International Conference, 2002

1998
Bounds for eigenvalues and condition numbers in the p-version of the finite element method.
Math. Comput., 1998

1997
Multi-p Preconditioners.
SIAM J. Sci. Comput., 1997

1995
Multi-<i>P</i> Methods: Iterative Algorithms for the <i>P</i>-Version of the Finite Element Analysis.
SIAM J. Sci. Comput., 1995


  Loading...